SlideShare a Scribd company logo
Safe Netizen HACK proof your browsing with smart use of HTTPS
SSL / HTTPS Supposedly Secure Layer HTTPS uses SSL to create a unique set of keys called Public & Private key used to encrypt the communication This can’t be forged  BUT impersonated There is no perfect impersonation & slightest of change will through a warning. User MUST NOT ignore these warnings
Firefox & Thunderbird
Internet Explorer 6
Internet Explorer 7
Microsoft Outlook
What to check?
 
How to check ?
 
What to do?
 
Am I getting HACKED? Someone might be trying to do a MITM attack Attacker will capture the traffic between your computer & server Can’t decrypt HTTPS traffic if it uses valid certificate Will impersonate the certificate Encrypt your data with HIS certificate, decrypt the same at his end, encrypt again with original server certificate & send to server YOU ARE HACKED!
OK, I get valid certificates But you are still not secure Most of the websites uses only password authentication over HTTPS Your mails/traffic still goes in plain text. WHY ??? Its an expensive mechanism (time & effort) A trade-off between speed & security
So what to do? Try using mail clients  (thunderbird / outlook / whatever) rather than web browser Atleast all the traffic is encrypted, it adds a little latency though, but on the other hand gives me ease to manage my mails Change the URL & force it to go over HTTPS That’s for emails, what for other apps? Use client applications as much as possible
Nothing is 100% secure But a smart netizen can atleast be 80-90% safe   ? Q & 42

More Related Content

PDF
Privateip jimdo com
PDF
Securing the channel - Tarkay Jamaan
PPTX
How to Boost Your Magento Store Security?
PPTX
Using pgp with mule
PPTX
Don’t Get Caught by Phishing Emails!
PDF
WHS-hackability-Index-083013
PPT
Mule security pgp with Example
Privateip jimdo com
Securing the channel - Tarkay Jamaan
How to Boost Your Magento Store Security?
Using pgp with mule
Don’t Get Caught by Phishing Emails!
WHS-hackability-Index-083013
Mule security pgp with Example

Viewers also liked (18)

PPT
Jump Start To Ooad And Design Patterns
DOCX
Coding guidelines
PPT
Sector Servizos
PPT
Denizimizdeki Baliklar
PPT
O Relevo PeníNsular
PDF
Arte NeocláSica
PPT
Romanticismo E Realismo
PPT
Arte Paleocristiá
PPT
Model Driven Architectures
PPTX
Cyber Safe Parenting
PPS
Risks With OpenID
PPT
Barajlar002
PDF
Quattrocento
DOCX
Versioning guidelines for product
PPT
Implementing application security using the .net framework
PPT
Sales And Marketing Recruitmen and Selection Plan
DOCX
Code review guidelines
PPT
How To Create Strategic Marketing Plan
Jump Start To Ooad And Design Patterns
Coding guidelines
Sector Servizos
Denizimizdeki Baliklar
O Relevo PeníNsular
Arte NeocláSica
Romanticismo E Realismo
Arte Paleocristiá
Model Driven Architectures
Cyber Safe Parenting
Risks With OpenID
Barajlar002
Quattrocento
Versioning guidelines for product
Implementing application security using the .net framework
Sales And Marketing Recruitmen and Selection Plan
Code review guidelines
How To Create Strategic Marketing Plan
Ad

Similar to Safe netizens (20)

PPTX
PPTX
Chapter 2 System Security.pptx
PPT
Outlook and thunderbird ii
PPT
Security - ch5.ppt
PPTX
Email security - Netwroking
PPT
Security
PPTX
Understanding-Web-Communication-HTTP-vs-HTTPS.pptx
ODP
Its presentation
PPTX
Protect your Privacy
PDF
Introduction to Information Security
ODT
How to identify unsafe websites
PPTX
Email hacking
PPTX
Protecting Web App users in today’s hostile environment
PDF
Email security
PPTX
Everyone Screws Up HTTPS
PPT
Web Security
PPT
Security 101
ODP
Lotusphere 2011 SHOW104
PDF
HTTPS: All you need to know
Chapter 2 System Security.pptx
Outlook and thunderbird ii
Security - ch5.ppt
Email security - Netwroking
Security
Understanding-Web-Communication-HTTP-vs-HTTPS.pptx
Its presentation
Protect your Privacy
Introduction to Information Security
How to identify unsafe websites
Email hacking
Protecting Web App users in today’s hostile environment
Email security
Everyone Screws Up HTTPS
Web Security
Security 101
Lotusphere 2011 SHOW104
HTTPS: All you need to know
Ad

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
MIND Revenue Release Quarter 2 2025 Press Release
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx

Safe netizens

  • 1. Safe Netizen HACK proof your browsing with smart use of HTTPS
  • 2. SSL / HTTPS Supposedly Secure Layer HTTPS uses SSL to create a unique set of keys called Public & Private key used to encrypt the communication This can’t be forged BUT impersonated There is no perfect impersonation & slightest of change will through a warning. User MUST NOT ignore these warnings
  • 8.  
  • 10.  
  • 12.  
  • 13. Am I getting HACKED? Someone might be trying to do a MITM attack Attacker will capture the traffic between your computer & server Can’t decrypt HTTPS traffic if it uses valid certificate Will impersonate the certificate Encrypt your data with HIS certificate, decrypt the same at his end, encrypt again with original server certificate & send to server YOU ARE HACKED!
  • 14. OK, I get valid certificates But you are still not secure Most of the websites uses only password authentication over HTTPS Your mails/traffic still goes in plain text. WHY ??? Its an expensive mechanism (time & effort) A trade-off between speed & security
  • 15. So what to do? Try using mail clients (thunderbird / outlook / whatever) rather than web browser Atleast all the traffic is encrypted, it adds a little latency though, but on the other hand gives me ease to manage my mails Change the URL & force it to go over HTTPS That’s for emails, what for other apps? Use client applications as much as possible
  • 16. Nothing is 100% secure But a smart netizen can atleast be 80-90% safe  ? Q & 42